A CLI wrapper for libmodsecurity (v3.0.10)
☆13Nov 22, 2023Updated 2 years ago
Alternatives and similar repositories for modsecurity-cli
Users that are interested in modsecurity-cli are comparing it to the libraries listed below
Sorting:
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆197Mar 6, 2024Updated last year
- Testability Pattern Catalogs for SAST☆32Feb 18, 2025Updated last year
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- Transformer Neural Network for Dynamic Malware Detection☆38Jan 29, 2026Updated last month
- a hackbot proof-of-concept☆41Feb 24, 2024Updated 2 years ago
- An Adaptive Misuse Detection System☆46Nov 4, 2024Updated last year
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Computational Memory Neural Network Compiler☆11Aug 11, 2021Updated 4 years ago
- No Language Left Unlocked: scalable backtranslation of NLLB models☆14Aug 4, 2025Updated 6 months ago
- Limit USB devices plugged to a linux host☆12Feb 12, 2018Updated 8 years ago
- TP-Framework: Testability Pattern Framework for SAST☆15May 10, 2024Updated last year
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 4 years ago
- ModSecurity CRS rules parser (project moved to CRS-support: see https://github.com/CRS-support/secrules_parsing)☆10Jun 3, 2019Updated 6 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- set of bash scripts to get a list of bad reputation IP addresses☆11Dec 17, 2015Updated 10 years ago
- Pure JavaScript Node.js implementation of a user space NFSv4 server.☆10Jan 9, 2016Updated 10 years ago
- ☆10Aug 9, 2024Updated last year
- Learn about cryptography concepts - Both basics and core.☆10Aug 9, 2024Updated last year
- Datasette plugin for outputting tables in formats suitable for copy and paste☆16Feb 17, 2024Updated 2 years ago
- A tool to integrate post-quantum secure TLS in NGINX using OpenSSL☆11Nov 15, 2021Updated 4 years ago
- ☆17Nov 24, 2025Updated 3 months ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- A set of utilities and tools to detect and search AI-generated code☆28May 30, 2025Updated 9 months ago
- Load MISP events into memcached for log enrichment using logstash☆12Jul 10, 2020Updated 5 years ago
- FPGA implementation of SKLearn Random Forest☆10Dec 12, 2016Updated 9 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- Vör is a set of services for gathering metrics by polling systems and delivering them to graphite.☆48Mar 7, 2018Updated 7 years ago
- Map MITRE attack to n dimensional embeddings and vise versa☆15May 22, 2025Updated 9 months ago
- Google Search for The Cheshire Cat AI☆10Dec 7, 2023Updated 2 years ago
- A collection of permissively licensed Semgrep rules.☆22Jul 5, 2024Updated last year
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- A Cybersecurity Generalist LLM (ICLR'26)☆32Feb 9, 2026Updated 2 weeks ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- Official code for "Evaluations of Machine Learning Privacy Defenses are Misleading" (https://arxiv.org/abs/2404.17399)☆12Apr 29, 2024Updated last year